Thanks for all replies so far,

the printer is a default unconfigured HP Officejet 6310, not so much
an industrial printer but a 3 in 1 lightweight used as a network
printer.  Maybe this is what the problem is.

>> I am using Nessus 3.2.0 with Client 3.0.0 under XP.  I have created a
>> policy and have not enabled the 'Scan Network Printers' however on my
>> test network the printer is scanned and it shoots out 2 sheets during
>> the scan.

This is also the same under Linux.

>Are the pages blank? If yes, try using the SYN scanner instead of the
>TCP scanner. If this works, I'm afraid I cannot propose a better
>solution.

No not blank,  'Get / Http /1.0' and 'Help' on the other, so I guess
that the remote web service on 80 is being probed there.  The web
service on 8089 appears to be a printer schema.


>> I am leading up to scanning an estate of a few thousand devices, but
>> would like to guarantee excluding printer scanning as much as
>> practically possible - is there anyway I can investigate further why
>> my printer was scanned?

>The nessus report you got on this IP may help us.

HTML attached

>> I may be able to exclude the printer IP addresses but they are not
>> neatly presented within the IP scope, however I could use nmap -O and
>> parse the results to get the majority of printer IPs.

>Using nmap against printers is not a good idea.

Appreciated, but it's quite happy to be scanned with nmap.

>Does this printer answers to SNMP, by the way?

Yes, I've not yet changed from the default read community string.

Thanks again.
List of hosts
192.168.0.109High Severity problem(s) found

[^] Back

192.168.0.109


Scan time :
Start time : Thu Apr 24 06:32:02 2008
End time : Thu Apr 24 06:35:48 2008
Number of vulnerabilities :
Open ports : 14
Low : 16
Medium : 3
High : 2

Information about the remote host :

Operating system : HP JetDirect Printer
NetBIOS name : HP0016354CDF35
DNS name : HP0016354CDF35.

[^] Back to 192.168.0.109

Port netbios-ns (137/udp)
Using NetBIOS to retrieve information from a Windows host

Synopsis :

It is possible to obtain the network name of the remote host.

Description :

The remote host listens on udp port 137 and replies to NetBIOS nbtscan
requests. By sending a wildcard request it is possible to obtain the
name of the remote system and the name of its domain.

Risk factor :

None

Plugin output :

The following 3 NetBIOS names have been gathered :

HP0016354CDF35 = Computer name
HP0016354CDF35 = File Server Service
PRINTER = Computer name

The remote host has the following MAC address on its adapter :
00:16:35:4c:df:35
CVE : CVE-1999-0621, CVE-1999-0621

Nessus ID : 10150

[^] Back to 192.168.0.109

Port ismserver (9500/tcp)

[^] Back to 192.168.0.109

Port sidewinder-game-voice (9110/tcp)

[^] Back to 192.168.0.109

Port general/udp
Traceroute
For your information, here is the traceroute from 192.168.0.106 to 192.168.0.109 :
192.168.0.106
192.168.0.109


Nessus ID : 10287

[^] Back to 192.168.0.109

Port snmp (161/udp)
Obtain system info type via SNMP

Synopsis :

The System Information of the remote host can be obtained via SNMP.

Description :

It is possible to obtain the system information about the remote
host by sending SNMP requests with the OID 1.3.6.1.2.1.1.1.

An attacker may use this information to gain more knowledge about
the target host.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin output :

System information :
sysDescr : HP ETHERNET MULTI-ENVIRONMENT
sysObjectID : 1.3.6.1.4.1.11.2.3.9.1
sysUptime : 0d 0h 1m 24s
sysContact :
sysName : printer
sysLocation :
sysServices : 72



Nessus ID : 10800
Obtain network interfaces list via SNMP

Synopsis :

The list of network interfaces cards of the remote host can be obtained via
SNMP.

Description :

It is possible to obtain the list of the network interfaces installed
on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.2.1.0

An attacker may use this information to gain more knowledge about
the target host.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin output :

Interface 1 information :
ifIndex : 2
ifDescr : Eth0
ifPhysAddress : 0016354cdf35

Interface 2 information :
ifIndex : Eth0
ifDescr :
ifPhysAddress :



Nessus ID : 10551
Discover HP JetDirect EWS Password via SNMP

Synopsis :

The administrative password of the remote HP JetDirect printer can be obtained
using SNMP.


Description :

It is possible to obtain the password of the remote HP JetDirect
web server by sending SNMP requests.

An attacker may use this information to gain administrative access
to the remote printer.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

http://www.securityfocus.com/archive/1/313714/2003-03-01/2003-03-07/0

Risk factor :

High

Plugin output :

Remote printer password is :
CVE : CVE-2002-1048
BID : 5331, 7001

Nessus ID : 11317
Default community names of the SNMP Agent

Synopsis :

The community name of the remote SNMP server can be guessed.

Description :

It is possible to obtain the default community names of the remote
SNMP server.

An attacker may use this information to gain more knowledge about
the remote host, or to change the configuration of the remote
system (if the default community allow such modifications).

Solution :

Disable the SNMP service on the remote host if you do not use it,
filter incoming UDP packets going to this port, or change the
default community string.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Plugin output :

The remote SNMP server replies to the following default community
strings :

private
public

CVE : CVE-1999-0186, CVE-1999-0254, CVE-1999-0516, CVE-1999-0517, CVE-2004-0311, CVE-2004-1474
BID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986

Nessus ID : 10264

[^] Back to 192.168.0.109

Port pdl-datastream (9100/tcp)

[^] Back to 192.168.0.109

Port unknown (7435/tcp)
Service detection
The service closed the connection without sending any data
It might be protected by some TCP wrapper

Nessus ID : 22964

[^] Back to 192.168.0.109

Port general/tcp
Host FQDN
192.168.0.109 resolves as HP0016354CDF35.

Nessus ID : 12053
OS Identification

Remote operating system : HP JetDirect Printer
Confidence Level : 100
Method : SNMP

Not all fingerprints could give a match - please email the following to [EMAIL PROTECTED] :
HTTP:!:Server: Virata-EmWeb/R6_0_1
SinFP:!:
P1:B11013:F0x12:W17520:O0204ffff:M1460:
P2:B11013:F0x12:W17376:O0204ffff01030300010104020101080affffffff44454144:M1460:
P3:B11020:F0x04:W0:O0:M0
P4:3205_7_p=9290R
SNMP:HP ETHERNET MULTI-ENVIRONMENT


The remote host is running HP JetDirect Printer

Nessus ID : 11936
Information about the scan
Information about this scan :

Nessus version : 3.2.0
Plugin feed version : 200804231534
Type of plugin feed : Registered (7 days delay)
Scanner IP : 192.168.0.106
Port scanner(s) : synscan
Port range : 1-65535
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
Max hosts : 10
Max checks : 5
Recv timeout : 5
Scan Start Date : 2008/4/24 6:32
Scan duration : 223 sec


Nessus ID : 19506
Check open ports
The following ports were open at the beginning of the scan but are now closed:

Port 7435 was detected as being open but is now closed
Port 9101 was detected as being open but is now closed
Port 9102 was detected as being open but is now closed

This might be an availability problem related which might be due to the following reasons :

- The remote host is now down, either because a user turned it off during the scan
- A network outage has been experienced during the scan, and the remote
network cannot be reached from the Vulnerability Scanner any more
- This Vulnerability Scanner has been blacklisted by the system administrator
or by automatic intrusion detection/prevention systems which have detected the
vulnerability assessment.

In any case, the audit of the remote host might be incomplete and may need to
be done again


Nessus ID : 10919

[^] Back to 192.168.0.109

Port unknown (9290/tcp)

[^] Back to 192.168.0.109

Port unknown (6839/tcp)
Service detection
The service closed the connection without sending any data
It might be protected by some TCP wrapper

Nessus ID : 22964

[^] Back to 192.168.0.109

Port http (80/tcp)
Service detection
A web server is running on this port.

Nessus ID : 22964
HTTP Server type and version

Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Virata-EmWeb/R6_0_1


Nessus ID : 10107
HyperText Transfer Protocol Information

Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem

Solution :

None.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : no
Pipelining : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Server: Virata-EmWeb/R6_0_1
Transfer-Encoding: chunked
Content-Type: text/html
Cache-Control: no-cache
Pragma: no-cache



Nessus ID : 24260

[^] Back to 192.168.0.109

Port unknown (9220/tcp)

[^] Back to 192.168.0.109

Port bacula-fd (9102/tcp)

[^] Back to 192.168.0.109

Port netbios-ssn (139/tcp)
SMB Detection
An SMB server is running on this port

Nessus ID : 11011
SMB NativeLanMan

Synopsis :

It is possible to obtain information about the remote operating
system.

Description :

It is possible to get the remote operating system name and
version (Windows and/or Samba) by sending an authentication
request to port 139 or 445.

Risk factor :

None

Plugin output :

The remote Operating System is : [
The remote native lan manager is :
The remote SMB Domain Name is :


Nessus ID : 10785
SMB log in

Synopsis :

It is possible to log into the remote host.

Description :

The remote host is running one of the Microsoft Windows operating
systems. It was possible to log into it using one of the following
account :

- NULL session
- Guest account
- Given Credentials

See also :

http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP
http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP

Risk factor :

none

Plugin output :

- NULL sessions are enabled on the remote host
- Remote users are authenticated as 'Guest'

CVE : CVE-1999-0504, CVE-1999-0505, CVE-1999-0506, CVE-2000-0222, CVE-2002-1117, CVE-2005-3595
BID : 494, 990, 11199

Nessus ID : 10394
SMB guest account for all users

Synopsis :

It is possible to log into the remote host.

Description :

The remote host is running one of the Microsoft Windows operating
systems. It was possible to log into it as a guest user using a
random account.


Solution :

In the group policy change the setting for
'Network access: Sharing and security model for local accounts' from
'Guest only - local users authenticate as Guest' to
'Classic - local users authenticate as themselves'.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVE : CVE-1999-0505

Nessus ID : 26919
SMB NULL session

Synopsis :

It is possible to log into the remote host.

Description :

The remote host is running one of the Microsoft Windows operating
systems. It was possible to log into it using a NULL session.

A NULL session (no login/password) allows to get information about
the remote host.

See also :

http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP
http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP

Risk factor :

None
CVE : CVE-2002-1117
BID : 494

Nessus ID : 26920

[^] Back to 192.168.0.109

Port bacula-dir (9101/tcp)

[^] Back to 192.168.0.109

Port apache-administration-server (8089/tcp)
Service detection
A web server is running on this port.

Nessus ID : 22964
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to